Author:
Patil Sachet Rajat Kumar,John Neil,Kunja Poorvi Sameep,Dwivedi Anushka,Suganthi S.,Honnnavali Prasad B.
Publisher
Springer Nature Singapore
Reference19 articles.
1. Jagelid, M.: Container vulnerability scanners: an analysis [Internet] [Dissertation]. (KTH ) (TRITA-EECS-EX) (2020). http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-279967
2. Sultan, S., Ahmad, I., Dimitriou, T.: Container security: issues, challenges, and the road ahead. IEEE Access 7, 52976–52996 (2019). https://doi.org/10.1109/ACCESS.2019.2911732
3. X. Wang, Q., Shen, W., Luo, P., Wu.: RSDS: Getting System Call Whitelist for Container Through Dynamic and Static Analysis. In: 2020 IEEE 13th International Conference on Cloud Computing (CLOUD), pp. 600–608, (2020) https://doi.org/10.1109/CLOUD49709.2020.00089
4. Gantikow, Holger, Reich, Christoph, Knahl, Martin, Clarke, Nathan. Rule-based Security Monitoring of Containerized Workloads. 543–550. (2019) https://doi.org/10.5220/0007770005430550
5. https://docs.docker.com/engine/security/seccomp/